task
stringlengths 12
101
| input
stringlengths 5
5.87k
| output
stringlengths 1
5.47k
| options
sequence | pageTitle
stringlengths 0
151
| outputColName
stringlengths 1
142
| url
stringlengths 24
147
| wdcFile
stringlengths 71
75
|
---|---|---|---|---|---|---|---|
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Valid across multiple platforms [Source] Compatibility of application packages [Description] | Applications can run on any conformant platform, potentially including any device form factor | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Access control log [Source] webinos [Description] | Allow access control decisions to be logged. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] API access rationale [Source] webinos [Description] | Applications shall be able to explain why access to data or APIs is being requested. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Application capability restriction [Source] webinos [Description] | Applications shall access only its specified device features, extensions and content. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Application intent [Source] webinos [Description] | Applications shall specify its required functionality at install time or during updates. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Application isolation [Source] webinos [Description] | Applications shall be isolated from each other. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Application policy approval [Source] webinos [Description] | Changes to existing application intentions and permissions shall be approved by the end user. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Authenticity check [Source] webinos [Description] | Before being installed or updated, origin authenticity and integrity checks shall be performed by the runtime | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Certifier list [Source] webinos [Description] | The list of authorities that certified an application shall be viewable by end-users. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Confidential credentials storage [Source] webinos [Description] | The webinos runtime shall support the confidential storage of user credentials. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Credentials access restriction [Source] webinos [Description] | Access to credentials storage shall be limited to a specific user, a specific device and a set of applications. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Data management rationale [Source] webinos [Description] | applications shall be able to explain how collected sensitive data will be managed. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Default policy [Source] webinos [Description] | A default security and privacy policy shall exist an be enforced on each conformant runtime | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Device-identity binding [Source] webinos [Description] | Personal devices shall be bound to their owner's identities. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Device-identity binding revokation [Source] webinos [Description] | The binding between personal devices and owner's identity shall be revokable. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Hierarchical policy enforcement [Source] webinos [Description] | Runtimes can enforce multiple access control rules written by multiple stakeholders in a hierarchy. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Secure cache [Source] webinos [Description] | Data cached by a runtime shall be securely stored to prevent disclosure and tampering by unauthorised entitites. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Secure storage [Source] webinos [Description] | Application data shall be securely stored to prevent disclosure and tampering by unauthorised entities. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Trusted application source [Source] webinos [Implications] Apps must have provenance data attached to them [Description] | When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] App stores can revoke applications [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] App permissions can be changed remotely [Description] | "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] External trusted party can set app default permissions [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] The user is not the only source of access control decisions. this also suggests a need for conflict resolution. [Description] | B2G: "App store must be able to set the default permissions for an app". | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Installation [Source] B2G, webinos [Description] | Applications must be installed before executed | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Owner override [Source] B2G (user), webinos (user) [Implications] Access control settings must be changeable [Description] | The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] App privilege visibility [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] There must be a standard way for applications to identify the permissions they have and lack [Description] | Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Permission usability [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Description] | Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Immunity to browser-based threats [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Non-browser security context: may be additional restrictions on HTML/JavaScript [Description] | Apps should not be vulnerable to common web vulnerabilities when granted significant privileges | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Pre-installed app permissions [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Different 'levels' apply to SysApps - possibly 'roles' [Description] | Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
203127cf_WG__Security_Model____W3C_Wiki__Description | [Requirement] Access to files outside owned by the platform [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] Need to provide both sandboxed and non-sandboxed storage [Description] | Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Description | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Supports many device form factors [Description] Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices [Source] SysApps Charter [Implications] | The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] DAP API Support [Description] All APIs defined by DAP should be accessible to system applications [Source] SysApps Charter [Implications] | Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Minimal user prompting [Description] Problems such as 'double prompting' should be avoided when integrating other APIs [Source] SysApps Charter [Implications] | Some details of the expected user interactions may need to be specified in the security model or APIs | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Communicate with other applications [Description] Applications can communicate with other applications [Implications] | Some kind of messaging will be supported | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Communicate with pre-defined endpoints [Description] Applications can communicate with pre-defined web addresses [Implications] | Access remote domains will be possible | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Trusted application source [Description] When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. [Source] webinos [Implications] | Apps must have provenance data attached to them | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] App stores can revoke applications [Description] "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | App permissions can be changed remotely | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] External trusted party can set app default permissions [Description] B2G: "App store must be able to set the default permissions for an app". [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | The user is not the only source of access control decisions. this also suggests a need for conflict resolution. | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Owner override [Description] The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) [Source] B2G (user), webinos (user) [Implications] | Access control settings must be changeable | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] App privilege visibility [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | There must be a standard way for applications to identify the permissions they have and lack | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Immunity to browser-based threats [Description] Apps should not be vulnerable to common web vulnerabilities when granted significant privileges [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | Non-browser security context: may be additional restrictions on HTML/JavaScript | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Pre-installed app permissions [Description] Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] | Different 'levels' apply to SysApps - possibly 'roles' | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
16eb7f48_WG__Security_Model____W3C_Wiki__Implications | [Requirement] Access to files outside owned by the platform [Description] Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] | Need to provide both sandboxed and non-sandboxed storage | [] | Difference between revisions of "System Applications WG: Security Model" - W3C Wiki | Implications | http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609 | 44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] ItemID [Applies] Item [Description] Returns the unique identifier assigned to the item by the simulation when it was created. [Type] | Attribute | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] Events [Applies] Item [Description] Returns the events currently scheduled for an item. [Type] | Collection | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] ItemClass [Applies] Item [Description] Returns the ItemClass of the item. [Type] | Attribute | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] Items [Applies] Item [Description] Refers to the sub items of the current item. [Type] | Collection | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] Location [Applies] Item [Description] Refers to another item that represents the current location of the item. [Type] | Attribute | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] Node [Applies] Item [Description] Returns the XML DOM node corresponding to the item. [Type] | Attribute | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
02c2d414_tion_Reference_Markup_Language__Type | [Part] Self [Applies] Item [Description] Returns a reference to the current item. In JavaScript, the keyword 'this' may also be used. In VBScript, the keyword 'Me' may also be used. [Type] | Attribute | [
[
"A",
"t",
"t",
"r",
"i",
"b",
"u",
"t",
"e"
],
[
"C",
"o",
"l",
"l",
"e",
"c",
"t",
"i",
"o",
"n"
]
] | SRML - Simulation Reference Markup Language | Type | http://www.w3.org/TR/2002/NOTE-SRML-20021218/ | 44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] Individual [Comment] Must be supported. [Semantics] | The Party is a single individual | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] Group [Comment] Must be supported. [Semantics] | The Party represents a defined group with multiple individual members | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] All [Comment] For example, may be used to indicate all the users of a specific social network the party is a member of. Note that “group” scope is also assumed. [Semantics] | All the collective individuals within a context | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] AllConnections [Comment] For example, may be used to indicate all “friends” of the Party. Note that “group” scope is also assumed. [Semantics] | All the first-level connections of the Party | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] All2ndConnections [Comment] For example, may be used to indicate all “friends of friends” of the Party. Note that “group” scope is also assumed. [Semantics] | All the second-level connections of the Party | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics | [Identifier] AllGroups [Comment] For example, may be used to indicate all groups that the Party is a member of. Note that “group” scope is also assumed. [Semantics] | All the group connections of the Party | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Agreement [Comment] Must contain at least the Party entity with Assigner role and a Party with Assignee role. The latter being granted the terms of the Agreement from the former. [Semantics] | Policy expressions that are formal contracts (or licenses) stipulating all the terms of usage and all the parties involved. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Offer [Comment] Must contain a Party entity with Assigner role. The Offer may contain a Party entity with Assignee role, but does not grant any privileges to that Party. [Semantics] | Policy expressions that propose terms of usage from an Asset owner | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Privacy [Comment] Must contain at least the Party entity with Assigner role and a Party with Assignee role. Must also contain a Duty on the assignee related to obligations towards managing the assigner’s Asset containing personal information. The Assignee is being granted the terms of the Privacy policy from the Assigner. [Semantics] | Policy expressions that stipulate the terms of usage over personal information. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Request [Comment] Must contain a Party entity with Assignee role. The Request may also contain the Party entity with Assigner role if this is known. No privileges are granted to any Party. [Semantics] | Policy expressions that propose terms of usage to an Asset owner | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Set [Comment] The Set is aimed at scenarios where there is an open criteria for the semantics of the policy expressions and typically refined by other systems/profiles that process the information at a later time. No privileges are granted to any Party. [Semantics] | Policy expressions that consists of entities from the complete model | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics | [Identifier] Ticket [Comment] May contain the Party entity with Assigner role and the Party entity with Assignee role. A Ticket (or Voucher) may be anonymous or personalised, where the holder of that Ticket may remain unknown or has to be identified. The holder, or if known, the Assignee, is being granted the terms of the Ticket from the Assigner (in known). [Semantics] | Policy expressions that stipulate the terms of usage and is redeemable by any Party who currently holds the Ticket in their possession | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=342 | 44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] ExclusiveMode [Description] whether to do inclusive or exclusive dealing of namespaces. In exclusive mode the InclusiveNamespaces parameter can be specified listing the prefixes that are to be treated in an inclusive mode [Default] false [Values] | true or false | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] InclusiveNamespace [Description] list of prefixes to be treated inclusively. Special token #default indicates the default namespace. [Default] empty [Values] | space separated list of prefixes | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] IgnoreComments [Description] whether to ignore comments during canonicalization [Default] true [Values] | true or false | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] TrimTextNodes [Description] whether to trim (i.e. remove leading and trailing whitespaces) all text nodes when canonicalizing. Adjacent text nodes must be coalesced prior to trimming. If an element has an xml:space="preserve" attribute, then text node descendants of that element are not trimmed regardless of the value of this parameter. [Default] false [Values] | true or false | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] Serialization [Description] whether to do the normal XML serialization (http://www.w3.org/2010/xml-c14n2#serializeXML), or do an EXI serialization (http://www.w3.org/2010/xml-c14n2#serializeEXI) - which is useful if the original document to be canonicalized is already in EXI format. [Default] serializeXML [Values] | serializeXML or serializeEXI | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] PrefixRewrite [Description] with none, prefixes are not changed, with sequential prefixes are changed to n1, n2, n3 ... and with derived, each prefix is changed to nSuffix, where the suffix is derived by doing a digest of the namespace URI. [Default] none [Values] | none, sequential, derived | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] SortAttributes [Description] whether the attributes need to be sorted before canonicalization. In some environments the order of attributes changes in transit so sorting is important. [Default] true [Values] | true or false | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] XmlAncestors [Description] where to inherit the simple inheritable attributes (xml:lang and xml:space) and combine the xml:base i.e. similar to Canonical XML 1.1 or to completely ignore xml attributes in ancestors similar to Exclusive Canonical XML 1.0 [Default] inherit [Values] | inherit, none | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
b8933e1e_Canonical_XML_Version_2_0__Values | [Name] QNameAware [Description] set of nodes whose entire content must be processed as QName-valued or [CURIE]-valued for the purposes of canonicalization, including prefix rewriting and recognition of prefix "visible utilization" [Default] empty set [Values] | an enumeration of qualified element names, qualified attribute names, and unqualified attribute names (identified by name, and parent qualified name) | [] | Canonical XML Version 2.0 | Values | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] ExclusiveMode [Values] true or false [Description] whether to do inclusive or exclusive dealing of namespaces. In exclusive mode the InclusiveNamespaces parameter can be specified listing the prefixes that are to be treated in an inclusive mode [Default] | false | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] InclusiveNamespace [Values] space separated list of prefixes [Description] list of prefixes to be treated inclusively. Special token #default indicates the default namespace. [Default] | empty | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] IgnoreComments [Values] true or false [Description] whether to ignore comments during canonicalization [Default] | true | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] TrimTextNodes [Values] true or false [Description] whether to trim (i.e. remove leading and trailing whitespaces) all text nodes when canonicalizing. Adjacent text nodes must be coalesced prior to trimming. If an element has an xml:space="preserve" attribute, then text node descendants of that element are not trimmed regardless of the value of this parameter. [Default] | false | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] Serialization [Values] serializeXML or serializeEXI [Description] whether to do the normal XML serialization (http://www.w3.org/2010/xml-c14n2#serializeXML), or do an EXI serialization (http://www.w3.org/2010/xml-c14n2#serializeEXI) - which is useful if the original document to be canonicalized is already in EXI format. [Default] | serializeXML | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] PrefixRewrite [Values] none, sequential, derived [Description] with none, prefixes are not changed, with sequential prefixes are changed to n1, n2, n3 ... and with derived, each prefix is changed to nSuffix, where the suffix is derived by doing a digest of the namespace URI. [Default] | none | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] SortAttributes [Values] true or false [Description] whether the attributes need to be sorted before canonicalization. In some environments the order of attributes changes in transit so sorting is important. [Default] | true | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] XmlAncestors [Values] inherit, none [Description] where to inherit the simple inheritable attributes (xml:lang and xml:space) and combine the xml:base i.e. similar to Canonical XML 1.1 or to completely ignore xml attributes in ancestors similar to Exclusive Canonical XML 1.0 [Default] | inherit | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
ebee36fd_Canonical_XML_Version_2_0__Default | [Name] QNameAware [Values] an enumeration of qualified element names, qualified attribute names, and unqualified attribute names (identified by name, and parent qualified name) [Description] set of nodes whose entire content must be processed as QName-valued or [CURIE]-valued for the purposes of canonicalization, including prefix rewriting and recognition of prefix "visible utilization" [Default] | empty set | [
[
"f",
"a",
"l",
"s",
"e"
],
[
"e",
"m",
"p",
"t",
"y"
],
[
"t",
"r",
"u",
"e"
],
[
"s",
"e",
"r",
"i",
"a",
"l",
"i",
"z",
"e",
"X",
"M",
"L"
],
[
"n",
"o",
"n",
"e"
],
[
"i",
"n",
"h",
"e",
"r",
"i",
"t"
],
[
"e",
"m",
"p",
"t",
"y",
" ",
"s",
"e",
"t"
]
] | Canonical XML Version 2.0 | Default | http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/ | 44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Additive?] yes ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Additive?] yes ['animate'] yes ['animate Color'] yes ['animate Transform'] no [Notes] Only RGB color values are additive. ['set'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Additive?] no ['animate'] no ['animate Color'] no ['animate Transform'] no ['set'] | no | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Additive?] no ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Additive?] yes ['animate'] no ['animate Color'] no ['animate Transform'] yes [Notes] Additive means that a transformation is post-multiplied to the base set of transformations. ['set'] | no | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
2cce7aff_Animation___SVG_1_1___20021115___set_ | [Data type] All other data types used in animatable attributes and properties [Additive?] no ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set'] | yes | [
[
"y",
"e",
"s"
],
[
"n",
"o"
]
] | Animation - SVG 1.1 - 20021115 | 'set' | http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html | 44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] absolutePosition [Comment] For example, JPEG image must be positioned at 100×100 pixel location. This may be used to express [PLUS] semantics. [Semantics] | A point defined with absolute coordinates | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] absoluteSize [Comment] For example, JPEG image must be reproduced onto an area no larger than A0. This may be used to express [PLUS] semantics. [Semantics] | The absolute dimension that the Asset may be resized | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] count [Comment] Should be a positive integer. [Semantics] | The numeric count indicating the number of times the corresponding entity may be exercised | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] dateTime [Comment] Date and Time value must conform to [ISO-8601] as represented in [W3CXMLSCHEMA]. The use of Timezone information is strongly recommended. [Semantics] | The date (and optional time and timezone) representing a point in time or period | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] fileFormat [Comment] For example, this may be used to express [PLUS] semantics; only JPEG image may be distributed. [Semantics] | The file format applicable to the Asset | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] industry [Comment] For example, publishing, financial. [Semantics] | The defined industry sector applicable to the asset usage | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] language [Comment] For example, this may be used to express [PLUS] semantics; JPEG image may only be reproduced with Spanish text. Must use [BCP-47] codes. [Semantics] | The natural language applicable to the asset usage | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] deliveryChannel [Comment] For example, the asset may be distributed only on mobile networks. [Semantics] | The delivery channel used for storing or communicating the asset | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] elapsedTime [Comment] The start of the period is when the action is first exercised. [Semantics] | A period of time in which the policy action can be exercised. | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] event [Comment] For example, asset may be used at the “FIFA World Cup” only. To express events related to undertaking Duties, a specific event value has been defined: policyUsage – the time period whilst the policy is being exercised This will enable constraints to be expressed such as “event lt o:policyUsage” indicating before the policy is exercised. [Semantics] | Specification of a defined event applicable to the asset usage | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] media [Comment] For example, electronic, print, advertising, marketing. This may be used to express [PLUS] semantics. [Semantics] | The media type in which the asset may be used | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] meteredTime [Comment] Value must conform to [ISO-8601] as represented in [W3CXMLSCHEMA]. For example “P30H” indicates a 30 hour period. [Semantics] | The maximum period of metered usage time | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] payAmount [Comment] The dataType attribute may be used to indicate the type of the value (eg decimal) and the unit attribute to indicate the currency. May be used for compensation duties. [Semantics] | The value of the financial payment | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] percentage [Comment] A numeric value from 0 to 100. For example, extract a maximum of 50% of the asset [Semantics] | The amount (as a percentage) of the action applicable to the asset | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] product [Comment] For example, this may be used to express [PLUS] semantics; images may only be reproduced in the XYZ Magazine. [Semantics] | The specified Product or Service name | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics | [Identifier] purpose [Comment] For example, educational use. [P3P] Purpose values may also be used. [Semantics] | Specification of a defined purpose applicable to the asset usage | [] | ODRL Version 2.1 Common Vocabulary | ODRL Community Group | Semantics | https://www.w3.org/community/odrl/vocab/2.1/?rev=332 | 44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.